期刊文献+

两个前向安全的代理签名方案的安全性分析 被引量:3

Security analysis of two forward secure proxy signature schemes
下载PDF
导出
摘要 针对最近一些学者提出的前向安全的代理签名方案和改进的前向安全的代理签名方案,给出了这两种代理签名方案的安全性分析,并指出它们是不安全的,均不具备前向安全性质。当代理人的私钥泄露后,前向安全的代理签名方案不能抵抗伪造攻击;而改进的前向安全的代理签名方案对攻击者来说仅利用公开的信息就可以实施伪造攻击。 Recently,some researchers proposed a forward secure proxy signature scheme and an improved forward-secure proxy signature scheme.This paper analyzed the security of the two proxy signature schemes and pointed out they were insecure and had not the characteristic of forward security at all.The first scheme couldn t resist forgery attack while the secret key of the proxy signer was lost.If adversary knew some public information of the second scheme,he/she could forge proxy signature.
出处 《计算机应用研究》 CSCD 北大核心 2009年第2期709-710,718,共3页 Application Research of Computers
基金 国家自然科学基金资助项目(60403027) 国家“863”高科技研究发展基金资助项目(301-1-3)
关键词 前向安全 代理签名 伪造攻击 安全分析 forward security proxy signature forgery attack security analysis
  • 相关文献

参考文献7

二级参考文献73

  • 1马春波,何大可.基于双线性映射的卡梅隆门限签名方案[J].计算机研究与发展,2005,42(8):1427-1430. 被引量:8
  • 2王天银,张建中.一个新的前向安全的代理数字签名方案[J].计算机工程与应用,2005,41(25):133-135. 被引量:19
  • 3王晓明,陈火炎,符方伟.前向安全的代理签名方案[J].通信学报,2005,26(11):38-42. 被引量:35
  • 4陈少真,李大兴.有效取消的向前安全群签名体制[J].计算机学报,2006,29(6):998-1003. 被引量:9
  • 5Kamoto T.. A digital multisignature scheme using bijective public-key cryptosystem. ACM Transactions on Computer Systems, 1988, 6(8): 432~441
  • 6Boldyreva A.. Efficient threshold signature, multisignature and blind signature schemes based on the Gap-Diffie-Hellman-group signature scheme. In: Proceedings of the Public Key Cryptography'03, Florida, USA, 2003, 31~46
  • 7Ohta K., Okamoto T.. Multi-signature scheme secure against active insider attacks. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences, 1999, E82-A(1) : 21~31
  • 8Lin C.Y., Wu T.C., Hwang J.J.. ID-based structured multisignature schemes. In: de Decker B ed.. Advances in Network and Distributed Systems Security. Boston: Kluwer Academic Publishers, 2001, 45~59
  • 9He W.H. Weaknesses in some multisignature schemes for specified group of verifiers. Information Processing Letters, 2002, 83(2): 95~99
  • 10Micali S., Ohta K., Reyzin L.. Accountable-subgroup multisignature: Extended abstract. In: Proceedings of the ACM Conference on Computer and Communication Security 2001(CCS 2001). Philadelphia, PA, USA, 2001, 245~254

共引文献93

同被引文献38

  • 1王天银,张建中.一个新的前向安全的代理数字签名方案[J].计算机工程与应用,2005,41(25):133-135. 被引量:19
  • 2王晓明,陈火炎,符方伟.前向安全的代理签名方案[J].通信学报,2005,26(11):38-42. 被引量:35
  • 3Mambo M,Usuda K,Okamoto E.Proxy signature:delegation of the power to sign messages[J].IEICE Transactions on Fundamen- tals of Electronic Communications and Computer Sciences, 1996, E79-A(9) : 1338-1354.
  • 4Mambo M, Usuda K, Okamoto E.Proxy signature for delegating signing operation[C]//Proceedings of the 3rd ACM Conference on Computer and Communications Security, New Delhi, India. New York:ACM Press, 1996:48-57.
  • 5Anderson R.Two remark on public key cryptology[C]//Proceed- ings of the 4th ACM Computer and Communication Security, Zurich, Switzerland, 1997 : 1-7.
  • 6Bellare M,Miner S K.A forward-secure digital signature scheme[C]// Proceedings of Cryptology-Crypto' 99.Berlin, Germany: Springer- Verlag, 1999: 431-448.
  • 7Mambo M, Usuda K, Okamoto E. Proxy signature for delegating signing operation. In: Proc. of the 3rd ACM Conf. on Computer and Communications Security. New York: ACM Press, 1996.48-57. [doi: 10.1145/238168.238185].
  • 8Boldyreva A, Palacio A, Warinschi B. Secure proxy signature schemes for delegation of signing rights, http://eprint.iacr.org/2003/ 096.pdf [doi: 10.1007/s00145-010-9082-x].
  • 9Malkin T, Obana S, Yung M. The hierarchy of key evolving signatures and a characterization of proxy signatures. In: Cachin C, Camenish J, eds. Proc. of the Advances in Cryptology-EUROCRYPT 2004. LNCS 3027, Berlin: Springer-Verlag, 2004. 306-322. [doi: 10.1007/978-3-540-24676-3_19].
  • 10Jacob C. N. Schuldt, Kanta Matsuura, Kenneth G. Paterson. Proxy signatures secure against proxy key exposure. In: Cramer R, ed. Proc. of the Public Key Cryptography-PKC 2008. LNCS 4939, Berlin: Springer-Verlag, 2008. 141-161. [doi: 10.1007/978-3-540- 78440-1_9].

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部